Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 14, Issue 4July 2020
Reflects downloads up to 13 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN

Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security are less explored. The IoT devices are light weight in nature and have low ...

research-article
Lightweight and privacy‐preserving authentication scheme with the resilience of desynchronisation attacks for WBANs

With the advances in wireless communication and Internet of things, wireless body area networks (WBANs) have attracted more and more attention because of the potential in improving the quality of health care services. With the help of WBANs, the user can ...

research-article
Privacy preservation with RTT‐based detection for wireless mesh networks

Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of services as compared to conventional networks. Due to the absence of centralised authority, WMNs suffers from both external and internal attacks, which decrease the ...

research-article
Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process

In recent years, the security of online social networks (OSNs) has become an issue of widespread concern. Searching and detecting compromised accounts in OSNs is crucial for ensuring the security of OSN platforms. In this study, the authors proposed a new ...

research-article
Security analysis of KAP based on enhanced MPF

In the previous study, authors proved that inversion of enhanced matrix power function (MPF), introduced as conjectured one‐way function, is a nondeterministic polynomial time (NP)‐complete problem. Furthermore, a key agreement protocol (KAP), the ...

research-article
Malware classification using compact image features and multiclass support vector machines

Malware and malicious code do not only incur considerable costs and losses but impact negatively the reputation of the targeted organisations. Malware developers, hackers, and information security specialists are continuously improving their strategies to ...

research-article
Algebraic method to recover superpolies in cube attacks

Cube attacks are an important type of key recovery attacks against nonlinear feedback shift register (NFSR)‐based cryptosystems. The key step in cube attacks closely related to key recovery is recovering superpolies. However, in the previous cube attacks ...

research-article
Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme

The identity‐based signature (IBS) scheme is one of the most promising secure and widely used cryptographic primitives for electronic commerce applications. For example, ID‐based signing in a multi‐party setting, without ever revealing any private and ...

research-article
Novel LDoS attack detection by Spark‐assisted correlation analysis approach in wireless sensor network

Low‐rate denial of service (LDoS) attack is a special DoS attack type of wireless sensor network (WSN). Routing protocol is the critical component of the WSN. Routing flood attack is a novel LDoS attack pattern in WSN. However, the attack is difficult to ...

research-article
Scan‐based attack tolerance with minimum testability loss: a gate‐level approach

Scan chain is an architectural solution to facilitate in‐field tests and debugging of digital chips, however, it is also known as a source of security problems, e.g. scan‐based attacks in the chips. The authors conduct a comprehensive gate‐level security ...

research-article
Cloud‐assisted secure and conjunctive publish/subscribe service in smart grids

The publish/subscribe (P/S) service on Advanced Metering Infrastructure (AMI) servers of smart grid need to deal with huge amount of data, which may lead to data burst on AMI servers and serious server crash. Moreover, for protecting data security, ...

Comments